New TamperedChef Attack Uses Weaponized PDF Editor to Steal Sensitive Data and Login Credentials

New TamperedChef Attack Uses Weaponized PDF Editor to Steal Sensitive Data and Login Credentials

Cybersecurity researchers at Truesec have uncovered a sophisticated malware campaign distributing a weaponized PDF editor under the guise of “AppSuite PDF Editor.”

This operation, which began on June 26, 2025, involves multiple websites promoting the software as a free utility tool, overlapping with findings from Expel on similar threats like ManualFinder.

The malicious executable, PDF Editor.exe, exhibits heavy obfuscation potentially generated by AI or large language models, with key hashes including MD5 6fd6c053f8fcf345efaa04f16ac0bffe, SHA1 2ecd25269173890e04fe00ea23a585e4f0a206ad, and SHA256 cb15e1ec1a472631c53378d54f2043ba57586e3a28329c9dbf40cb69d7c10d2c.

Distribution Tactics

Upon execution, the installer prompts a EULA, initiates an HTTP GET request to hxxp://inst.productivity-tools.ai/status/InstallStart?v=1.0.28.0&p=PDFEditor&code=EN-US to signal start, and downloads the core payload from hxxp://vault.appsuites.ai/AppSuites-PDF-1.0.28.exe.

installation file

Completion triggers additional GET requests to confirm installation, establishing persistence via a registry key in HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionRun with arguments like –cm for behavioral control.

Initially appearing benign, the software included mechanisms to poll for updates via a .js file, first noted on VirusTotal submissions as early as May 15, 2025.

However, from August 21, 2025, infected systems received commands activating the TamperedChef infostealer, adding a new registry entry for PDFEditorUpdater with –cm=–fullupdate.

This loads an obfuscated payload into /resources/app/w-electron/bun/releases/pdfeditor.js, enabling various –cm arguments such as –install, –enableupdate, –disableupdate, –fullupdate, –partialupdate, –backupupdate, –check, –ping, and –reboot.

Once activated, TamperedChef employs DPAPI to query browser databases for sensitive data, scans for security products, and terminates browser processes to access locked information like login credentials.

The campaign leverages Google Ads for promotion, with traffic revealing at least five campaign IDs and referrers, indicating a broad reach.

Spanning 56 days before malicious activation aligning closely with typical 60-day ad cycles the threat actors maximized downloads before weaponizing the tool.

Digital signatures on variants come from dubious certificates issued to entities like ECHO Infini SDN BHD, GLINT By J SDN.

TamperedChef Attack
digital certificate

BHD, and SUMMIT NEXUS Holdings LLC, BHD, with ECHO Infini’s website appearing generically AI-generated and sharing addresses with other suspicious firms.

Further ties link this to BYTE Media, whose certificates signed unrelated malware like Epibrowser.

Threat Actor History

Investigations trace the actor’s activities back to at least August 2024, involving potentially unwanted programs (PUPs) like OneStart and Epibrowser browsers, bundled with malicious code contacting the same C2 domains as TamperedChef.

Samples of OneStart exhibit similar behaviors, suggesting a pattern of disguising malware as utility tools.

In some installations, an elevate.exe binary recompiled from open-source code by Johannes Passing and signed by ECHO Infini appears alongside PDF Editor, potentially for future privilege escalation, though no executions were observed.

This escalation highlights the actor’s evolving tactics, affecting organizations in Europe through employee downloads.

According to the report, Truesec emphasizes vetting software from unknown sources, as benign tools can rapidly turn malicious. Google has responded helpfully to reports, urging notifications to local CERTs and the company for similar threats.

The campaign underscores risks in ad-driven software distribution, with ongoing variants rendering hash lists non-exhaustive.

Indicators of Compromise (IOC)

Category Examples
Hosting Domains apdft.net, mypdfonestart.com, ltdpdf.com, pdfreplace.com, appsuites.ai
C2 Domains y2iax5.com, abf26u.com, mka3e8.com, 5b7crp.com
SHA256 Hashes da3c6ec20a006ec4b289a90488f824f0f72098a2f5c2d3f37d7a2d4a83b344a0 (PDF Editor), 189b0ba8c61740d5ad1c802649718958a86f5b7a8c8e795dc2e990909a9ab88a (Elevate), abbb3e96b910c9d1e2074dc05fd51e78984941f03bcb7d443714838849a7a928 (PDF Editor), 2e4de114ad10967f1807f317f476290dc0045bdfa9395553d1b443ef9f905018 (EpiBrowser)

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.